CVE-2017-15361

Description

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

References

MitigationVendor Advisory
Issue TrackingMitigationPatchThird Party Advisory
Issue TrackingPatchThird Party Advisory
Issue TrackingMitigationThird Party Advisory
Issue TrackingThird Party Advisory
MitigationThird Party Advisory
Issue TrackingThird Party Advisory
MitigationThird Party Advisory
MitigationThird Party Advisory
Third Party AdvisoryVDB Entry
Issue TrackingMitigationUS Government ResourceThird Party Advisory
MitigationThird Party Advisory
Issue TrackingMitigationThird Party Advisory
MitigationThird Party Advisory

CvssV3 impact

BaseSeverity

MEDIUM

ConfidentialityImpact

HIGH

AttackComplexity

HIGH

Scope

UNCHANGED

AttackVector

NETWORK

AvailabilityImpact

NONE

IntegrityImpact

NONE

PrivilegesRequired

NONE

BaseScore

5.9

VectorString

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Version

3.0

UserInteraction

NONE

CvssV2 impact

Version

2.0

VectorString

AV:N/AC:M/Au:N/C:P/I:N/A:N

AccessVector

NETWORK

AccessComplexity

MEDIUM

Authentication

NONE

ConfidentialityImpact

PARTIAL

IntegrityImpact

NONE

AvailabilityImpact

NONE

BaseScore

4.300000190734863